Tech

Protect your computer – Tips on how to do it

Here we compiled a list of the top things you can do to protect yourself and your computer. Some are well known and others may seem surprising, but they will all help you stay safe online this year. Find out here for more tips.

Update applications and operating systems and make the latest patches 

Automatic updating and installing features ensure that updates are applied as soon as they are published. Thanks to this, the configuration of your system remains safe and takes into account the latest patches and versions. For an enterprise, experts recommend implementing a vulnerability search software and running it at least once a week. 

Although many programs have an automatic update feature, you should check how often these updates are installed and set the frequency to “daily” if possible. If the software does not have an automatic update function, you must update it manually by visiting the manufacturer’s website and downloading the appropriate patches.

Keep your security software up to date 

Regularly installing antivirus software updates protects you from most attacks. For example, Trend Micro Internet Security Pro and Trend Micro Internet Security 2008includes built-in protection against vulnerabilities and attacks, as well as firewall and content filtering functions. Trend Micro also offers the Vulnerability Assessment package, designed for larger enterprises and institutions. 

Along with Control Manager, it provides an assessment of the current network security level and reporting of this status to identify potential security vulnerabilities. Scan programs with security software. Always read the license agreement and cancel the installation if you notice that others are being downloaded along with the program you want.

Download a website reputation checker 

Download a web reputation checker such as TrendProtect. This service helps you avoid websites that contain unwanted content or hidden threats.

 

Disable scripts and “widgets” 

Many Internet attacks rely on scripting languages to start malicious programmes in the browser, or on downloaded “widgets” that launch harmful programmes locally. You can protect yourself from these popular attack methods by disabling scripting and avoiding downloading widgets as much as possible.

 

Be vigilant and suspicious 

Individual users are the main target of phishing attacks. It’s best to only open attachments that come from known or expected sources, and delete any unwanted or suspicious messages. If the message comes from a well-known company or website, only click on links that are on the same site. Redirects to another site are a sign that the message may be fraudulent.

Never send confidential information in response to an unverified request

Many customers do not realize that banks and other institutions never request the transmission of confidential or personal information over the Internet. Banks also never call to ask for information about the account or other personal data (eg PESEL). Never provide confidential information in response to an e-mail or telephone call. 

You can provide confidential information only after calling the institution and verifying the identity of the person requesting such information. When requesting a Social Security Number (US applicable), enter only the last four digits. Telephone operators ask for such a number to verify the customer, but if the customer provides additional proof of identity, the last four digits will suffice.

Do not click on spam links. 

Spam itself is not dangerous – problems only arise depending on what the user does after receiving it. For example, if spam prompts a user to click on a link for more information, trouble can begin. Never click on any links in such a message to avoid phishing attacks and malware downloads.

Ignore Unverified Support Requests

Although many charities use email to raise funds, verify the request by calling the organization directly. Many phishing attacks, such as the scam known as the “419 Nigerian scam,” disguise itself under the guise of needy assistance.

Do not forward electronically distributed petitions 

E -mail chains and online petitions are almost never genuine, they just hide scams designed to build up a larger list of email addresses quickly and easily. Unfortunately, the criminals behind these scams are unknowingly helped by people who pass these messages on to friends and family members. In fact, most of these emails do not prompt you to take any specific action to resolve the problem. Some petitions require a full name, postal address, and email address. The mailing lists collected in this way are then used for phishing and other Internet crimes.

Companies should create workplace regulations and educate employees

Company data access policies should be clearly defined in writing and distributed to key employees, and then enforced across the enterprise to prevent data leakage. In addition, since many data leaks are caused inadvertently, companies should protect their data by educating employees and establishing procedures for handling classified information. Raising awareness of the problem among employees is an integral part of a multi-layered protection strategy.